{"id":124192,"date":"2025-05-23T03:19:09","date_gmt":"2025-05-23T03:19:09","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/124192\/"},"modified":"2025-05-23T03:19:09","modified_gmt":"2025-05-23T03:19:09","slug":"russian-hackers-target-firms-shipping-aid-to-ukraine-us-intelligence-says","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/124192\/","title":{"rendered":"Russian hackers target firms shipping aid to Ukraine, US intelligence says"},"content":{"rendered":"<p>WASHINGTON (AP) \u2014 Hackers working for Russian military intelligence targeted Western technology and logistics companies involved in shipping <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/russia-ukraine-war-trump-kremlin-349e58cfe22eb3e77e75c15989cbc110\" target=\"_blank\" rel=\"noopener\">assistance to Ukraine<\/a>, the U.S. National Security Agency said.<\/p>\n<p>The hackers were trying to obtain details about the type of assistance entering Ukraine and, as part of the effort, sought access to the feeds of internet-connected cameras near Ukrainian border crossings, according to <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/media.defense.gov\/2025\/May\/21\/2003719846\/-1\/-1\/0\/CSA_RUSSIAN_GRU_TARGET_LOGISTICS.PDF\" target=\"_blank\" rel=\"noopener\">the NSA\u2019s report<\/a> on the cyberattack, which was issued late Wednesday. <\/p>\n<p>The cyber campaign sought to penetrate defense, transportation and logistics companies in several Western countries, including the U.S., as well as ports, airports and rail systems. The report didn\u2019t specify which types of aid Russia was surveilling, but Ukraine\u2019s allies have contributed significant amounts of <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/ukraine-russia-weapons-military-aid-686f9420eb8ef7d4baa7a3858e20ff69\" target=\"_blank\" rel=\"noopener\">military and humanitarian assistance<\/a> since the war began.<\/p>\n<p>More than 10,000 internet-connected cameras were targeted, including private devices and public traffic cameras near critical transportation points, such as ports, rail hubs or border crossings. Most were in Ukraine, though some were in Romania, Poland and other eastern or central European countries. <\/p>\n<p>Officials did not disclose details about the hackers\u2019 success or how long they remained unnoticed. The activity detailed in the report began in 2022, the same year that <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/russia-ukraine-war-one-year-anniversary-timeline-a1304c6fb319bf1c0e93635f6f6a2633\" target=\"_blank\" rel=\"noopener\">Russia invaded Ukraine<\/a>.<\/p>\n<p>Russia is expected to continue its efforts to spy on aid shipments, and companies involved in aid logistics or shipments should be on guard, according to the report, which was issued jointly by the NSA, the FBI and security agencies in several allied nations.<\/p>\n<p>\u201cTo defend against and mitigate these threats, at-risk entities should anticipate targeting,\u201d the NSA said.<\/p>\n<p>Authorities linked the activity to a Russian military intelligence unit dubbed \u201cFancy Bear\u201d that is <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/24945d9b04f04c8c913d8bcb3f77090d\" target=\"_blank\" rel=\"noopener\">well known<\/a> for its past campaigns targeting the U.S. and its allies.<\/p>\n<p>The hackers used a variety of tactics to gain access, including <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/microsoft-solarwinds-spear-phishing-7abd240b9d3a25bedecf6441ca6dc74f\" target=\"_blank\" rel=\"noopener\">spearphishing<\/a>, which involves sending authentic-looking messages to a potential victim that contain links to harmful software or requests for sensitive information.<\/p>\n<p>The Russian team also exploited security vulnerabilities in computer devices used at small and in-home offices, networks that often lack the security measures found in larger systems.<\/p>\n<p>The hackers didn\u2019t use particularly innovative techniques, according to Grant Geyer, chief strategy officer at the cybersecurity company Claroty. Nevertheless, the sprawling yet carefully orchestrated effort gives the Russians a \u201cgranular understanding\u201d of the aid sent to Ukraine, he said.<\/p>\n<p>\u201cThey have done detailed targeting across the entire supply chain to understand what equipment is moving, when and how \u2014 whether it\u2019s by aircraft, ship or rail,\u201d Geyer said.<\/p>\n<p>Russia could use the information it obtained to hone its war planning, Geyer said, or to plot further cyber or physical attacks on the supply chain to Ukraine.<\/p>\n<p>Last fall, U.S. intelligence officials <a class=\"Link AnClick-LinkEnhancement\" data-gtm-enhancement-style=\"LinkEnhancementA\" href=\"https:\/\/apnews.com\/article\/sabotage-russia-germany-putin-ukraine-058ee53d79af97bc9a499ccc10a5e35a\" target=\"_blank\" rel=\"noopener\">issued a public bulletin<\/a> directing American defense companies and suppliers to increase security precautions following several acts of sabotage in Europe that officials have blamed on Russia.<\/p>\n<p>The Russian Embassy in Washington didn\u2019t immediately respond to messages seeking comment.<\/p>\n","protected":false},"excerpt":{"rendered":"WASHINGTON (AP) \u2014 Hackers working for Russian military intelligence targeted Western technology and logistics companies involved in shipping&hellip;\n","protected":false},"author":2,"featured_media":124193,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7654],"tags":[2000,299,4179,55211,15986,40,8617,332,7659,53,657,5213,10673,263],"class_list":{"0":"post-124192","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ukraine","8":"tag-eu","9":"tag-europe","10":"tag-general-news","11":"tag-grant-geyer","12":"tag-hacking","13":"tag-immigration","14":"tag-military-and-defense","15":"tag-russia","16":"tag-russia-government","17":"tag-technology","18":"tag-ukraine","19":"tag-united-states-government","20":"tag-washington-news","21":"tag-world-news"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114554992317488468","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/124192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=124192"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/124192\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/124193"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=124192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=124192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=124192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}